Cloud-Based Identity and Identity Meta-Data

2016 ◽  
pp. 1756-1773
Author(s):  
Grzegorz Spyra ◽  
William J. Buchanan ◽  
Peter Cruickshank ◽  
Elias Ekonomou

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store and process sensitive personal data. It introduces the new concepts of Compound Personal Record (CPR) and Compound Identifiable Data (CID) ontology, which aim to move toward own your own data model. The CID model ensures authenticity of identity meta-data; high availability via unified Cloud-hosted XML data structure; and privacy through encryption, obfuscation and anonymity applied to Ontology-based XML distributed content. Additionally CID via XML ontologies is enabled for identity federation. The paper also suggests that access over sensitive data should be strictly governed through an access control model with granular policy enforcement on the service side. This includes the involvement of relevant access control model entities, which are enabled to authorize an ad-hoc break-glass data access, which should give high accountability for data access attempts.

2014 ◽  
Vol 3 (1) ◽  
pp. 49-66 ◽  
Author(s):  
Grzegorz Spyra ◽  
William J Buchanan ◽  
Peter Cruickshank ◽  
Elias Ekonomou

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store and process sensitive personal data. It introduces the new concepts of Compound Personal Record (CPR) and Compound Identifiable Data (CID) ontology, which aim to move toward own your own data model. The CID model ensures authenticity of identity meta-data; high availability via unified Cloud-hosted XML data structure; and privacy through encryption, obfuscation and anonymity applied to Ontology-based XML distributed content. Additionally CID via XML ontologies is enabled for identity federation. The paper also suggests that access over sensitive data should be strictly governed through an access control model with granular policy enforcement on the service side. This includes the involvement of relevant access control model entities, which are enabled to authorize an ad-hoc break-glass data access, which should give high accountability for data access attempts.


2013 ◽  
Vol 394 ◽  
pp. 540-545
Author(s):  
Bing Han ◽  
Geng Liu ◽  
Yang Li ◽  
Xiao Hui Yang

Property of transmission system will directly influence the performance and reliability of helicopters. Information exchange and sharing are difficult in transmission system life-cycle, which has complex product to fabricate and mass information to handle. To solve this problem, we establish a unified product data (UPD) to manage the information of research-development process for transmission system. In distributed collaborative environment, a single enterprise UPD is established by analysing transmission system development process and data flow. The theoretical frame of UPD and several key techniques are studied, including architecture, model, management, consistency, and mapping of data access control. Data integration and data access control model in development process is discussed in this paper. A UPD integration framework based on collaborative agent is presented, which shows the evolvement theory among PUPD, DUPD, SUPD and IUPD. Besides, task-role-based access control model is proposed, and dynamic right control process is given for UPD.


2020 ◽  
Vol 16 (4) ◽  
pp. 313-331
Author(s):  
Valery Vasenin ◽  
Alexander Itkes ◽  
Maxim Krivchikov ◽  
Evgeniya Yavtushenko

Sign in / Sign up

Export Citation Format

Share Document